|Publication number||US6738813 B1|
|Application number||US 09/659,476|
|Publication date||May 18, 2004|
|Filing date||Sep 11, 2000|
|Priority date||Sep 11, 2000|
|Also published as||WO2002023434A2, WO2002023434A3|
|Publication number||09659476, 659476, US 6738813 B1, US 6738813B1, US-B1-6738813, US6738813 B1, US6738813B1|
|Original Assignee||Mercury Interactive Corporation|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (12), Non-Patent Citations (14), Referenced by (138), Classifications (17), Legal Events (6)|
|External Links: USPTO, USPTO Assignment, Espacenet|
This application relates generally to the subject matter described in the following U.S. patent applications, the disclosures of which are hereby incorporated herein by reference: application Ser. No. 09/484,686, titled POST DEPLOYMENT MONITORING OF SERVER PERFORMANCE, filed Jan. 17, 2000 now U.S. Pat. No. 6,449,501; application Ser. No. 09/484,684, titled SERVICE FOR LOAD TESTING A TRANSACTIONAL SERVER OVER THE INTERNET, filed on Jan. 17, 2000 now U.S. Pat. No. 6,477,483; and application Ser. No. 09/531,821, filed Mar. 21, 2000, titled SERVER MONITORING USING VIRTUAL POINTS OF PRESENCE.
The present invention relates to methods for monitoring and testing the performance of a web site or other server system as experienced from multiple user locations on a computer network.
The performance of a web site or other Internet server system, as experienced by end users of the system, can vary significantly depending on the geographic locations of the users. For example, users in London may experience much greater response times than users in San Francisco. Such variations in end user experience may occur, for example, as the result of Internet traffic conditions, malfunctioning Internet routers, or malfunctioning DNS (Domain Name Service) servers.
The ability to detect such location-dependent problems can be valuable to web site operators. For example, if users in a particular geographic region are known to frequently experience long response times, the web site operator can set up a mirror site within that region to service such users. The web site operator can also benefit from knowing whether a given problem is limited to specific geographic regions. For example, if it is known that a particular problem is seen by users in many different geographic locations, the web site operator can more easily identify the source of the problem as being local to the web site.
Some companies have addressed such needs of web site operators by setting up automated services for monitoring web sites from multiple geographic locations. These services are implemented using automated agents that run on computers at selected Internet connection points, or “points of presence.” The points of presence are typically selected to correspond to major population centers, such as major cities throughout the world. The agents operate by periodically accessing the target web site from their respective locations as simulated users, and by monitoring response times and other performance parameters during such accesses. The agents report the resulting performance data over the Internet to a centralized location, where the data is typically aggregated within a database of the monitoring service provider and made available to the web site operator for viewing. The collected data may also be used to automatically alert the web site operator when significant performance problems occur.
A significant problem with the above approach is that the cost of setting up and maintaining agent computers in many different geographic regions is very high. For example, the monitoring service provider typically must pay for regional personnel who have been trained to set up and service the agent software and computers. Another problem is that users of the service can only monitor performance as seen for the fixed agent locations selected by the service provider.
The present invention provides a monitoring system and service in which community members monitor their respective Web sites, or other server systems, as seen from the computing devices of other community members. In a preferred embodiment, the system includes an agent component that runs on the computing devices of community members to provide functionality for accessing an monitoring end-user performance of a server system. By running the agent component on a computing device, a user effectively makes that computing device available to other community members for use as a remote monitoring agent. The agents are remotely programmable over a network, and may be programmable, for example, to execute a particular Web transaction while monitoring specified performance parameters (server response times, network hop delays, etc). In one embodiment, the agent component monitors performance only when the host computing device is in an otherwise idle or a low CPU-utilization state, and thus does not interfere with the ordinary operation of the host device.
The system also includes a controller that communicates with the agent computing devices over the Internet or other network. The controller keeps track of the agent devices that are currently in an active state (e.g., connected to the Internet with the agent component running) by monitoring messages transmitted by the agent devices. The system also includes a user interface (preferably part of the controller) that provides functionality for users to set up sessions to monitor their servers from the active agents (typically geographically distributed). The interface may allow the user to select the agent devices from a real time directory of active agents, and/or may allow the user to specify criteria for the automated selection of the agents.
Once a monitoring session has been set up, work requests are dispatched (preferably by the controller, or alternatively by an originating agent) to the selected agent devices. These work requests preferably specify the server system, transactions, and performance parameters to be monitored by the agents. Performance data collected by the agents during the course of the monitoring session is collected in a database and is made available for online viewing. The performance data collected by the agents may be used both to generate server-specific reports and general Internet “weather maps.”
An important benefit of using shared community resources to host the agent software is that it reduces or eliminates the need for the service provider to set up and administer agent computers at various points of presence. Another benefit is that users are not limited to the fixed agent locations selected by the service provider, but rather can monitor their systems from the user locations of any other community members.
In accordance with one aspect of the invention, the controller preferably monitors the extent to which each user contributes processing resources to the community, and compensates each user accordingly. Preferably, the compensation is in the form of credit toward future use of the service. For example, once Company A has allowed other community members to execute one hundred Web transactions from Company A's computers, Company A may be permitted to execute one hundred transactions from the computing devices of other members. The use of such a reciprocal usage policy desirably encourages users to make their computing devices available to other community members when the devices are not in use.
In accordance with another aspect of the invention, the agents may implement an algorithm for measuring hop delay along the route between the agent device and a monitored server. When one agent detects a slow hop, the controller (or the agent) may automatically invoke other agents (preferably agents that frequently use the subject hop) to further test the hop. In this manner, the hop may be tested concurrently from multiple agent devices and locations to more accurately determine whether a router problem exists.
FIG. 1 illustrates the general architecture and data flow of a system according to the present invention.
FIG. 2 illustrates an example process for setting up a monitoring session.
FIG. 3 illustrates the flow of information between an agent and the controller in FIG. 1.
FIG. 4 illustrates the use of multiple agents to measure delay along a network segment.
FIG. 5 illustrates a method for using multiple agents for more accurately testing hop delay on a network.
The following description is intended to illustrate certain embodiments of the invention, and should not be read in a limiting sense. The scope of the invention is defined by the appended claims.
Throughout the description, the following terms will generally have the following meanings:
The term “service provider” refers to the provider of the community-based monitoring service described herein.
The term “monitoring” refers generally to both long-term or recurring performance monitoring and to short-term performance testing (e.g., server load testing).
The term “end user performance” refers generally to the performance seen by end users of a system, and components of such performance. For example, the end user performance of a server system may include both actual server performance, and the performance of routers and other intermediate components that connect a user to the server system.
FIG. 1 illustrates the architecture of a community-based performance monitoring system according to one embodiment of the invention. The system provides a service for monitoring the end user performance of transactional servers 30 (one shown in FIG. 1) as seen from multiple user locations on the Internet. The transactional server 30 is typically a Web site on the Internet, but may generally be any type of multi-user server system and may include any number of physical servers. A typical user of the service is a business that owns or operates a Web site, and wishes to monitor the Web site as seen by users in various geographical locations.
As illustrated in FIG. 1, the system includes a software agent component 32 that is adapted to be installed by users on computing devices 34 (three shown in FIG. 1). The agent component 32 may, for example, be made available by the service provider as a free download. The computing devices 34 may, for example, include end-user PCs and wireless devices having intermittent Internet access, and network servers and gateways having continuous or near-continuous Internet access. A host computing device 34 having the agent component 32 installed or running thereon is referred to herein as an “agent.”
As with agents used within conventional monitoring systems, the agents 34 operate generally by accessing the transactional server 30 as simulated users while monitoring one or more performance parameters (such as total response times, hop delays, availability, etc.). A user may install and run the agent component 32 on any number of computing devices 34, and by doing so, makes each such computing device available to the community of registered service users for purposes of performance monitoring.
The agent component 32 may also include functionality for recording transactions to be emulated or “executed” by the agents. A separate recorder may alternatively be used for this purpose. Examples of typical transactions include logging in, performing a search, making a reservation, or checking a price of an item. As is conventional, the recorded transactions are typically in the form of transaction files (e.g., script files) specifying the messages generated by a client application during the user's interaction with the server system. The transaction files may also specify the content of expected server responses.
The agent component 32 is preferably designed, or is user-configurable, to monitor the transactional server only when the host computing device 34 is in an idle or lightly-loaded state, disregarding the load produced by the agent component itself. The agent component thus does not affect the performance of the computing device as seen by the user or owner of the device. The agent component may run primarily as a background task.
As depicted in FIG. 1, the system also includes a central controller 40 that communicates with the agents 34 over the Internet. As described below, one of the tasks performed by the controller is to remotely “program” the agents by dispatching work requests (e.g., transaction files and associated execution parameters) to them. The controller 40 is implemented on one or more Internet-connected servers which may, but need not, reside in the same physical location. As illustrated, the controller 40 includes a user interface (UI) 40A—preferably a collection of Web pages—for allowing users to register with the service and to thereafter set up monitoring sessions. Information provided by users during registration and session setup is stored in a user database 42.
As further depicted in FIG. 1, the controller 40 also includes a session controller 40B that keeps track of and controls service usage on a per-user-account basis. The session controller 40B preferably implements a “reciprocity” usage policy in which the extent to which a given user may use the service to monitor a transactional server is dependent upon the extent to which that user has contributed agent resources to the community. For example, once User_A's agents have been used by other community members to execute one hundred transactions, User_A may be awarded the right to execute (or to purchase at a discount) one hundred transactions using community resources. The use of a reciprocity policy desirably encourages users to make their computing devices available to the community. The reciprocity policy may be implemented by the session controller 40B by issuing tokens to users, where each token represents the right to execute (or to purchase at a discount) some number of transactions. The token counts may be maintained within the user database 42, and may be used as a form of currency for setting up or executing monitoring sessions. The service provider may also sell or award tokens to users without requiring any contribution of processing resources. The reciprocity policy may alternatively be based on duration-of-use, number of page requests generated, number of bytes transferred between agent and server, or some other metric.
Rather than using a reciprocity policy, the service provider could provide monetary compensation, free or discounted Internet access, or another form of compensation to users for their respective contributions of processing resources. With this scheme, a user may benefit from making his computer available even if he has no interest in using the monitoring service. The quantity of tokens or other compensation awarded may depend on whether the agent resources are contributed during peak versus off-peak hours. Compensation may also be given to users by the operators of the transactional servers 30 monitored by the service.
As illustrated in FIG. 1, the controller 40 maintains a real-time agent directory 40B of the agents that are currently “active” (e.g., connected to the Internet with the agent component running and available). Ideally, many hundreds or thousands of agent computers in a variety of geographic locations will be active at any given time, so that the service can monitor each transactional server 30 from many different locations concurrently. A large number of active agents also facilitates the generation of loads sufficient for server load testing. Although a centralized directory is preferred, non-centralized protocols for keeping track of active computers can be used, such as the protocol implemented within the Gnutella service for sharing music files.
The directory 40B may be used by an automated scheduler 40D that dynamically selects the agents 34 to include in monitoring sessions. The scheduler may select the agents based on resource availability (e.g., the current processing loads and availability states of the agent computers 34), and/or based criteria specified by users during session set-up. In one embodiment, the scheduler implements a load-balancing algorithm to balance the load associated with concurrent sessions across the available agents 34. The automated scheduler may further distribute the load by scheduling the sessions themselves. For example, the scheduler may postpone a load test until the available agent resources are sufficient to produce the desired load. As discussed below, the directory 40B may additionally or alternatively be made available to users such that a user can manually select the agents to include in a monitoring session.
As further shown in FIG. 1, the agents 34 report the performance data they measure to a reports server 50—either directly as shown or via the controller 40. The agents preferably transmit the performance data to the reports server in real time on a transaction-by-transaction basis, together with corresponding session identifiers. The reports server stores the performance data in a database 52 in association with the user account and session to which the data corresponds. As depicted in dashed lines in FIG. 1, the controller 40 and the reports server 50 may be accessible to users via a common Internet Web site or portal.
Through a series of private, customizable online reports provided by the reports server 50, users can view graphs and charts of the various performance parameters measured by the agents 34. Depending upon the type of agent and transactional server used, these parameters may include, for example, average and maximum transaction response times, “breakdowns” of transaction response times (e.g., time spent on the client, server, and network), hop delays along the network paths between the agents and the transactional server, and transaction failure rates. The reports server 50 may also allow the user to view the performance data associated with a particular agent “attribute” such as location, ISP (Internet Service Provider), connection speed, or closest frequently-used router. For example, the user may view the average response time as seen from users (agents) in London, or as seen from agents that use a particular ISP. Examples of the types of reports that may be used are provided in above-referenced U.S. application Ser. No. 09/484,686.
In addition to providing account-specific or server-specific reports, the reports server 50 may generate and provide public access to one or more Internet “weather maps” (general reports on the current status of the Internet). These weather maps may be generated based on an analysis of the collected performance data aggregated over multiple user accounts, and may include information about router problems, congestion conditions, and other types of conditions detected by the agents. For example, the weather maps could include one or more of the following types of data: (1) general Internet line loads (carriers, tier-1,2,3); (2) behavior of routers, including errors, load, misconfiguration, and redirection data; (3) behavior of distributed load balancers, such as information about “bad” and “good” redirections, (4) Domain Name System (DNS) server response times and errors; (5) performance parameters of various types of end servers, such as World Wide Web, Mail, and FTP; and (6) caching problems.
The information contained within the Internet weather maps may be used by ISPs ASPs (Application Service Providers) and content providers (among others) to locate and correct hardware problems, reroute and more efficiently distribute Internet traffic and content, and monitor service as seen by customers. Specific examples include the following: 1. reseating configuration, such as by selecting locations of distributed server load balancers (SLBs) and mirror sites; (2) site Akamization; (3) resetting Peering Agreements; (4) monitoring compliance with Service Level Agreements (SLAs) from the end-user point of view; (5) by ISPs to provide online end-user support; and (6) by cable and DSL operators to monitor in real time the quality of the service provided to their customers.
In addition to the components shown in FIG. 1, the system may optionally include any number of dedicated agent computers provided by the service provider. The dedicated agent computers may be provided at (or remotely connected to) fixed points of presence on the Internet.
Various types of safeguards may be built into the system to protect the community members from privacy and security breaches. For example, the service may prevent users from exercising Web sites or systems other than their own. The service may also place other restrictions on the types of transactions that can be dispatched to the agents of other community members. In addition, the service may maintain the anonymity of the community members (i.e., not reveal the identity of one community member to another), and may report the session data without revealing details of the agent devices 34 used within the session.
During registration, the user enters various account information, including the URL (Uniform Resource Locator) of the transaction server to be monitored. The user may also be asked to specify the attributes (e.g., locations, ISPs, connection speeds, IP addresses, etc.) of the computer or computers 34 to be used as agents. In addition, the user may be permitted to specify the times of day during which his agent computers may be used by the community. Once the registration process is complete, the user can record transactions using conventional recording methods (e.g., using a built-in recorder of the agent component 32), and can upload the recorded transaction files to the user database 42.
FIG. 2 illustrates one example of a process that may be used to set up monitoring sessions through the controller's user interface 40A. The reference numbers included in FIG. 2 are included in parentheses in the following description. Initially, the user selects the prerecorded transaction or transactions to use (60) and specifies the performance parameters to be monitored (62). Although the use of prerecorded transactions is preferred, the agents could monitor end user performance without using transactions. For example, the agents 34 could merely ping the transactional server to test for immediate availability, and/or test network latency as described below.
To protect against denial-of-service attacks and other types of misuses of the monitoring service, the controller 40 may automatically check the selected transactions to ensure that they are directed exclusively to transactional servers operated by the user setting up the session. The user may also specify parameter or service level thresholds for generating alarm conditions. As illustrated, the user is then prompted to select between the following three session options: load test, immediate (manual) test, and recurring monitoring session (64).
If the “load test” option is selected, the user is prompted to specify the target load, such as in hits or transactions per minute (68). As illustrated, the user may also be prompted to specify a duration and time window for performing the test. The automated scheduler 40D uses these parameters both to schedule the load test and to select the agent computers 34 to use. In token-based implementations, if the user's token count is insufficient to perform the load test, the user may be given the option to purchase additional tokens (not shown). During execution of the load test, the controller 40 may monitor the actual load applied to the transactional server 30 (by monitoring the performance data streams from the relevant agents 34), and may increase or decrease the number of agents, and/or the number of virtual users emulated by the agents, as needed to generate the target load.
If the “immediate (manual) test” option is selected, the user is prompted to select the agents 34 from the real time directory 40C and to assign transactions to these agents (70). To facilitate the selection of agents, the user interface may provide a filter or search engine for allowing the user to quickly locate available agents having desired attributes. For example, the user may be able to run a search for the agents that are connected directly to, or which frequently use, a particular router, or to run a search for the agents that frequently use a particular service provider or carrier. The user may also specify various other parameters (not shown), such as the total number of transaction execution events, and may be given the option to purchase tokens. Once the parameters have been entered, the test is initiated and is executed to completion.
If the “recurring monitoring session” option is selected, the user is prompted to specify agent attributes to be used by the automatic scheduler 40D to dynamically select the agents (72). These attributes may include, for example, geographic regions (e.g. cities), ISPs, nearest routers, or agent device types. The user may also be given the option to manually select one or more fixed (dedicated) agents. The user is also prompted to select a scheduling option for executing the recurring session (74). The scheduling options may include, for example, “run whenever token count reaches X tokens,” “run once per hour,” “run whenever host is idle,” “use tokens as they are awarded,” or “purchase tokens as needed to maintain target transaction rate.” The user may also be given the option to specify other types of session parameters (not shown), such as maximum load. Once the recurring session is initiated, the session continues until terminated by the user.
FIG. 3 illustrates the communications that occur between each agent 34 and the controller 40 in one embodiment. When the agent 34 is in an active state, the agent sends “active” messages to the controller 40—either periodically or in response to polling messages from the controller. The agent 34 may be configurable by the user to enter the active state only during certain times of day, or only when the processing load (e.g., CPU utilization) of the agent device 34 is below a specified threshold. The “active” messages may include unique agent identifiers to allow the controller to look up the agents and associated attributes in the database 42. The messages may also include information about the current processing load of the agent device 34. The controller 40 uses the “active” messages received from the agents to maintain the real time directory 40C, and to select agents for use.
When the controller 40 assigns an agent to a particular session, the controller sends a “work request” to the agent to effectively program the agent. As depicted in FIG. 3, the work request includes one or more transaction files (e.g., scripts) that define the transaction(s) to be executed by the agent. If the transaction server 30 is a Web site, these files specify the HTTP messages (URL requests, etc.) to be generated by the agent, and any expected responses from the server. The controller 40 also sends associated execution parameters to the agents, such as the number of transaction iterations, the number of concurrent virtual users, the types of parameters to monitor, and a session identifier.
One possible variation of this agent programming method is to use agents that are configured to send work requests to other agents directly by peer-to-peer communications. With this method, the agent that sets up a monitoring session could initially access the controller 40 to identify the other agents to use, and could then dispatch transaction files and associated execution parameters directly to such agents. The agents could also be configured to report the performance data directly to the originating agent.
As further illustrated in FIG. 3, the agent 34 may be configured to send an “inactive” message to the controller 40 to indicate a transition to an inactive state. The agents may be configured to send “inactive” messages when, for example, the agent device's CPU utilization remains above a threshold level for a particular period of time, or when the agent component 32 is properly closed by a user. Upon receiving an “inactive” message or otherwise detecting a transition to an inactive state, the controller may automatically transfer the inactive agent's sessions to a suitable replacement agent.
One application for the invention involves the use of the agents 34 to monitor segment or “hop” delays on the Internet. By way of background, a software utility known as traceroute (included in Microsoft Windows 95/98/NT and other operating systems) exists for determining the hop delays along each segment of a route between a source and a destination computer. The traceroute utility operates generally by sending of a packet (using the Internet Control Message Protocol or ICMP) from the source computer, and including in the packet a time limit value (known as the TTL, or “time to live”) that is designed to be exceeded by the first router that receives the packet. This router responds to the expiration of the TTL value by discarding the ICMP packet and returning a Time Exceeded message. This enables traceroute to determine the time required for the hop to the first router. After increasing the time limit value, traceroute resends the packet so that reaches the second router in the path to the destination, which returns another Time Exceeded message, and so on. In this manner, traceroute can measure the response time or delay of each successive hop. Traceroute determines when the packet has reached the destination by including a port number that is outside the normal range. When the packet is received by the destination computer, a Port Unreachable message is returned, enabling traceroute to measure the time length of the final hop.
In accordance with one aspect of the invention, the agent component 32 includes a traceroute-type utility for monitoring hop delays between an agent computer 34 and a Web server 30. The utility is preferably the WebTrace™ utility available from Mercury Interactive Corporation. The WebTrace utility uses the same general hop delay measurement algorithm as conventional traceroute utilities, but sends HTTP (Hypertext Transfer Protocol) packets (and specifically, TCP “SYN” frames) rather than ICMP packets. The destination server responds to the SYN frame by returning a SYN/ACK message. An important benefit to using HTTP packets is that the packets are less likely to be blocked by Internet firewalls. Another benefit is that the HTTP packets are more likely to follow the route used for ordinary Web traffic.
The hop delays measured by the agents 34 may be used, for example, to pinpoint and correct router problems that are the source of poor end-user performance. To measure hop delay and pinpoint router problems with a high degree of reliability, it is desirable to monitor the hop delays using multiple, independent agents in different locations. This is illustrated in FIG. 4, in which three different agents 34 use the hop between routers R3 and R4 to communicate with a monitored Web site 34. The likelihood of multiple agents using the same network segment can be statistically increased by including a large number of agents within a monitoring session.
To further increase the likelihood of multiple agents using a particular hop, the controller 40 (and/or the agent component 32) may include functionality for locating active agents that are directly connected to, or which commonly use (based on past history), a particular router or hop. For example, once a slow hop has been identified by an agent 34, the controller 40 (or that agent) may automatically search for other active agents that use, or are likely to use, the same hop. As depicted in FIG. 5, the controller may automatically incorporate these agents into the session, and instruct them to invoke the WebTrace utility to monitor hop delay. These agents may alternatively be suggested to the user, or may be located “manually” using a search utility of the controller's user interface. The aggregated hop delay data generated by the agents for the slow hop provides a more accurate indication of whether a router problem exists.
As will be recognized by the foregoing, special Web sites 30 can be set up on the Internet for purposes testing hop delays and other components of network latency. These Web sites, which can be set up at obscure URLs, could serve the sole purpose of responding to requests from agents 34, without actually providing any service to users. This would allow the agents to monitor network latency without placing a load on a Web site used by actual customers.
As mentioned above, the router and hop delay data captured the agents 34 may also be aggregated and incorporated into an Internet weather map.
The system and methods described above may be used to monitor end user performance of Web sites and various other types of multi-user systems. One particular application for the invention is to monitor performance as seen by users of WAP (Wireless Application Protocol) wireless devices. For example, the agent components 32 may be adapted to run on WAP phones, and to monitor a WAP application server when the phones are not otherwise being used. The performance data collected by these agent phones 34 may be used to monitor the WAP application server and/or the status of the associated wireless links. A WAP service provider may provide free or discounted service to users who permit their phones to be used as monitoring agents.
Another specific application involves running the agent component 32 on residential gateways 34 used to interconnect home networks to outside networks. This approach allows the unused processing power of a residential gateway to be used to monitor Web sites and other types of systems. Users who make their residential gateways available for this purpose may receive free or discounted Internet access, free or discounted access to the content of a monitored Web site, or other forms of compensation.
Other applications for the invention will be apparent to those skilled in the art.
Although the invention has been described in terms of certain preferred embodiments, other embodiments that are apparent to those of ordinary skill in the art, including embodiments which do not provide all of the features and advantages set forth herein, are also within the scope of this invention. Accordingly, the scope of the invention is defined by the claims that follow.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US5742754||Mar 5, 1996||Apr 21, 1998||Sun Microsystems, Inc.||Software testing apparatus and method|
|US5781703 *||Sep 6, 1996||Jul 14, 1998||Candle Distributed Solutions, Inc.||Intelligent remote agent for computer performance monitoring|
|US5812780 *||May 24, 1996||Sep 22, 1998||Microsoft Corporation||Method, system, and product for assessing a server application performance|
|US5905868||Jul 22, 1997||May 18, 1999||Ncr Corporation||Client/server distribution of performance monitoring data|
|US6006260||Jun 3, 1997||Dec 21, 1999||Keynote Systems, Inc.||Method and apparatus for evalutating service to a user over the internet|
|US6061725 *||Jan 12, 1999||May 9, 2000||Ganymede Software Inc.||Endpoint node systems computer program products for application traffic based communications network performance testing|
|US6138157||Oct 12, 1998||Oct 24, 2000||Freshwater Software, Inc.||Method and apparatus for testing web sites|
|US6157618 *||Jan 26, 1999||Dec 5, 2000||Microsoft Corporation||Distributed internet user experience monitoring system|
|US6205413||Jun 11, 1998||Mar 20, 2001||Chatschik Bisdikian||End-user oriented performance monitoring system for interactive end-to-end data communications|
|US6466548 *||Oct 28, 1998||Oct 15, 2002||Cisco Technology, Inc.||Hop by hop quality of service measurement system|
|US6591298 *||Apr 24, 2000||Jul 8, 2003||Keynote Systems, Inc.||Method and system for scheduling measurement of site performance over the internet|
|US6606658 *||Mar 13, 1998||Aug 12, 2003||Fujitsu Limited||Apparatus and method for server resource usage display by comparison of resource benchmarks to determine available performance|
|1||"SETI and Distributed Computing," by Garrett Moritz, dated 1998, printed from http://www.gtexts.com/college/papers/s7.html on Nov. 17, 2003, 5 pages.|
|2||Article dated Aug. 12, 2000 by Catherine Linden Traugot, titled "News from the Triangle: Finding use for idle power," printed from Upside Today web site.|
|3||Dalton, G., "Online Measurement-Keynote's service lets companies see what customers see," Information Week Online, May 10, 1999 (2 pages printed from informationWeek.com Web Site).|
|4||Dalton, G., "Online Measurement—Keynote's service lets companies see what customers see," Information Week Online, May 10, 1999 (2 pages printed from informationWeek.com Web Site).|
|5||Duchien, L., Gay V. and Horlait E., "X.400-Based Distributed Application Design Methodology" ACM Annual Computer Science Conference, Mar. 3-5, 1992, pp. 517-523.|
|6||GIMPS find a Multi-million digit prime!) by Chris Caldwell, printed from http://www.utm.edu/research/primes/notes/6972593 on Nov. 17, 2003, 3 pages, undated.|
|7||Hariri, et al., "Design and Analysis of a Proactive Application Management System (PAMS)," Proactive Application Management System, IEEE, pp. 89-102, (2000).|
|8||International Search Report for PCT/US01/28129 (3 pages).|
|9||Liotta, et al., "Modelling Network and System Monitoring over the Internet with Mobile Agents," IEEE, pp. 303-312, (1998).|
|10||Mainkar, V., "Availability Analysis of Transaction Processing Systems based on User-Perceived Performance," Proc. Sixteeth Symp. On Reliable Distributed Systems, pp. 10-17, dated Oct. 1997.|
|11||Press release dated Feb. 14, 2001 titled: "Porivo Technologies Launches First Web Performance Testing Application Powered by Peer-to-Peer Distributed Computing Technology," printed from porivo.com web site.|
|12||Press release dated Oct. 2, 2000 titled: "Porivo Technologies Launches the Porivo Peer: Distributed Computing Technology Harnesses Spare Computing Capacity Across the Internet," printed from porivo.com web site.|
|13||Randall, N., "Web Site Analysis Tools: The Results Are In," PC Magazine, Mar. 10, 1998, pp. 188-210.|
|14||Wired News article titled "Getting Some Alien Experience," by Jennifer Sullivan, dated Aug. 3, 1998, 3 pages.|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US6973490 *||Jun 23, 2000||Dec 6, 2005||Savvis Communications Corp.||Method and system for object-level web performance and analysis|
|US7082604 *||Apr 20, 2001||Jul 25, 2006||Mobile Agent Technologies, Incorporated||Method and apparatus for breaking down computing tasks across a network of heterogeneous computer for parallel execution by utilizing autonomous mobile agents|
|US7155722 *||Jul 10, 2001||Dec 26, 2006||Cisco Technology, Inc.||System and method for process load balancing in a multi-processor environment|
|US7216164 *||Oct 9, 2002||May 8, 2007||Cisco Technology, Inc.||Methods and apparatus for determining the performance of a server|
|US7231446 *||Oct 10, 2001||Jun 12, 2007||Juniper Networks, Inc.||HTTP multiplexor/demultiplexor|
|US7321565 *||Aug 29, 2003||Jan 22, 2008||Ineoquest Technologies||System and method for analyzing the performance of multiple transportation streams of streaming media in packet-based networks|
|US7353272||Jul 21, 2005||Apr 1, 2008||Savvis Communications Corporation||Method and system for internet performance monitoring and analysis including user interface and periodic information measurement and collection|
|US7363370 *||May 26, 2006||Apr 22, 2008||Metilinx||Multi-platform optimization model|
|US7373376 *||Dec 30, 1999||May 13, 2008||Keynote Systems, Inc.||Method and system for evaluating quality of service over the internet|
|US7379994 *||Oct 26, 2001||May 27, 2008||Metilinx||Aggregate system resource analysis including correlation matrix and metric-based analysis|
|US7409444 *||May 10, 2004||Aug 5, 2008||Bdna Corporation||Method and apparatus for managing business cell phone usage|
|US7409569||Jun 8, 2005||Aug 5, 2008||Dartdevices Corporation||System and method for application driven power management among intermittently coupled interoperable electronic devices|
|US7454458 *||Jun 24, 2002||Nov 18, 2008||Ntt Docomo, Inc.||Method and system for application load balancing|
|US7454542||Jun 8, 2005||Nov 18, 2008||Dartdevices Corporation||System device and method for configuring and operating interoperable device having player and engine|
|US7490148||May 30, 2002||Feb 10, 2009||At&T Intellectual Property I, L.P.||Completion performance analysis for internet services|
|US7512949 *||Sep 3, 2003||Mar 31, 2009||International Business Machines Corporation||Status hub used by autonomic application servers|
|US7546368 *||Jun 1, 2005||Jun 9, 2009||Neustar, Inc.||Systems and methods for isolating local performance variation in website monitoring|
|US7571346||Jun 8, 2005||Aug 4, 2009||Dartdevices Interop Corporation||System and method for interoperability application driven error management and recovery among intermittently coupled interoperable electronic devices|
|US7581224 *||Jul 10, 2003||Aug 25, 2009||Hewlett-Packard Development Company, L.P.||Systems and methods for monitoring resource utilization and application performance|
|US7596227||Jun 8, 2005||Sep 29, 2009||Dartdevices Interop Corporation||System method and model for maintaining device integrity and security among intermittently connected interoperating devices|
|US7600252||Jun 8, 2005||Oct 6, 2009||Dartdevices Interop Corporation||System method and model for social security interoperability among intermittently connected interoperating devices|
|US7613881||Jun 8, 2005||Nov 3, 2009||Dartdevices Interop Corporation||Method and system for configuring and using virtual pointers to access one or more independent address spaces|
|US7631073 *||Jan 27, 2005||Dec 8, 2009||International Business Machines Corporation||Method and apparatus for exposing monitoring violations to the monitored application|
|US7673040||Oct 6, 2005||Mar 2, 2010||Microsoft Corporation||Monitoring of service provider performance|
|US7702763 *||Jul 31, 2002||Apr 20, 2010||Hewlett-Packard Development Company, L.P.||Remote monitoring of computer devices|
|US7703073||Jun 8, 2005||Apr 20, 2010||Covia Labs, Inc.||Device interoperability format rule set and method for assembling interoperability application package|
|US7711803 *||Mar 30, 2004||May 4, 2010||Computer Associates Think, Inc.||Method and system for management and configuration of remote agents|
|US7712102 *||Jul 30, 2004||May 4, 2010||Hewlett-Packard Development Company, L.P.||System and method for dynamically configuring a plurality of load balancers in response to the analyzed performance data|
|US7712111||Jun 8, 2005||May 4, 2010||Covia Labs, Inc.||Method and system for linear tasking among a plurality of processing units|
|US7730174 *||Jan 15, 2004||Jun 1, 2010||Computer Associates Think, Inc.||System and method for agent-based monitoring of network devices|
|US7730482||Jun 8, 2005||Jun 1, 2010||Covia Labs, Inc.||Method and system for customized programmatic dynamic creation of interoperability content|
|US7747720||May 23, 2005||Jun 29, 2010||Cisco Technology, Inc.||Arrangement for selecting a server to provide distributed services from among multiple servers based on a location of a client device|
|US7747980||Jun 8, 2005||Jun 29, 2010||Covia Labs, Inc.||Method and system for specifying device interoperability source specifying renditions data and code for interoperable device team|
|US7761863||Jun 8, 2005||Jul 20, 2010||Covia Labs, Inc.||Method system and data structure for content renditioning adaptation and interoperability segmentation model|
|US7783759 *||Dec 10, 2002||Aug 24, 2010||International Business Machines Corporation||Methods and apparatus for dynamic allocation of servers to a plurality of customers to maximize the revenue of a server farm|
|US7788663||Jun 8, 2005||Aug 31, 2010||Covia Labs, Inc.||Method and system for device recruitment interoperability and assembling unified interoperating device constellation|
|US7792989 *||Apr 21, 2005||Sep 7, 2010||Cisco Technology, Inc.||Arrangement for selecting a server to provide distributed services from among multiple servers based on a location of a client device|
|US7801127||Oct 24, 2005||Sep 21, 2010||Ineoquest Technologies, Inc.||System and method for creating a sequence number field for streaming media in a packet-based networks utilizing internet protocol|
|US7814202||Jun 5, 2009||Oct 12, 2010||Neustar, Inc.||Isolating local performance variation in website monitoring|
|US7831752||Oct 21, 2008||Nov 9, 2010||Covia Labs, Inc.||Method and device for interoperability in heterogeneous device environment|
|US7848237||Jan 18, 2007||Dec 7, 2010||Ineoquest Technologies, Inc.||System and method for selective packet discard for the transport of multiple transportation streams of streaming media in packet-based networks|
|US7860990 *||Jan 31, 2006||Dec 28, 2010||Genband Us Llc||Session data records and related alarming within a session over internet protocol (SOIP) network|
|US7861003 *||Jan 31, 2006||Dec 28, 2010||Genband Us Llc||Adaptive feedback for session over internet protocol|
|US7865612||Jan 31, 2006||Jan 4, 2011||Genband Us Llc||Method and apparatus for partitioning resources within a session-over-internet-protocol (SoIP) session controller|
|US7899903||Sep 30, 2005||Mar 1, 2011||Microsoft Corporation||Template based management system|
|US7912062||Sep 28, 2007||Mar 22, 2011||Genband Us Llc||Methods and apparatus for managing addresses related to virtual partitions of a session exchange device|
|US7937460 *||Jul 7, 2004||May 3, 2011||Computer Associates Think, Inc.||System and method for providing service level management|
|US7945635 *||Sep 18, 2001||May 17, 2011||Koninklijke Philips Electronics N.V.||Internet receiving arrangement having quality test means|
|US7971251 *||Mar 17, 2006||Jun 28, 2011||Airdefense, Inc.||Systems and methods for wireless security using distributed collaboration of wireless clients|
|US8001240 *||Jan 19, 2009||Aug 16, 2011||International Business Machines Corporation||Generic method for resource monitoring configuration in provisioning systems|
|US8031623||Oct 24, 2005||Oct 4, 2011||Ineoquest Technologies, Inc.||System and method for creating multiple transportation streams of streaming media network test traffic in packet-based networks|
|US8069215 *||May 16, 2005||Nov 29, 2011||Cisco Technology, Inc.||Configurable downloading of content pointed to in electronic messages|
|US8171174||Jan 19, 2006||May 1, 2012||Dell Products L.P.||Out-of-band characterization of server utilization via remote access card virtual media for auto-enterprise scaling|
|US8171474||Sep 30, 2005||May 1, 2012||Serguei Mankovski||System and method for managing, scheduling, controlling and monitoring execution of jobs by a job scheduler utilizing a publish/subscription interface|
|US8204043||Sep 29, 2006||Jun 19, 2012||Genband Us Llc||Quality of service prioritization of internet protocol packets using session-aware components|
|US8234089 *||Nov 7, 2002||Jul 31, 2012||National Instruments Corporation||Auto-scheduling of tests|
|US8245201 *||Apr 30, 2004||Aug 14, 2012||International Business Machines Corporation||Method and system for recording and replaying service interactions|
|US8259706||Sep 29, 2006||Sep 4, 2012||Genband Us Llc||Multistage prioritization of packets within a session over internet protocol (SOIP) network|
|US8266270 *||Jul 16, 2002||Sep 11, 2012||At&T Intellectual Property I, L.P.||Delivery performance analysis for internet services|
|US8266477||Jan 11, 2010||Sep 11, 2012||Ca, Inc.||System and method for modifying execution of scripts for a job scheduler using deontic logic|
|US8306022 *||Aug 26, 2005||Nov 6, 2012||At&T Intellectual Property Ii, L.P.||Method for content-aware redirection and content renaming|
|US8332502 *||Feb 3, 2003||Dec 11, 2012||Metavante Corporation||Business to business network management event detection and response system and method|
|US8347268 *||Oct 12, 2007||Jan 1, 2013||Infosys Limited||Automated performance monitoring|
|US8351593 *||Nov 6, 2006||Jan 8, 2013||Aspect Software, Inc.||Emergency recording during VoIP session|
|US8370485 *||Oct 12, 2010||Feb 5, 2013||Neustar, Inc.||Isolating local performance variation in website monitoring|
|US8473610 *||Jun 22, 2011||Jun 25, 2013||Giraffic Technologies Ltd||Proactive data storage in a distributed network|
|US8509218||Sep 29, 2006||Aug 13, 2013||Genband Us Llc||Prioritization within a session over internet protocol (SOIP) network|
|US8533279||Sep 21, 2010||Sep 10, 2013||Trading Systems Associates (Ts-A) (Israel) Limited||Method and system for reconstructing transactions in a communication network|
|US8588069||Dec 16, 2008||Nov 19, 2013||Ineoquest Technologies, Inc.||System and method for analyzing the performance of multiple transportation streams of streaming media in packet-based networks|
|US8621076||Aug 15, 2012||Dec 31, 2013||At&T Intellectual Property I, L.P.||Delivery performance analysis for internet services|
|US8625455||Oct 17, 2006||Jan 7, 2014||Ineoquest Technologies, Inc.||System and method for handling streaming media|
|US8656022||May 21, 2010||Feb 18, 2014||International Business Machines Corporation||Methods and apparatus for dynamic allocation of servers to a plurality of customers to maximize the revenue of a server farm|
|US8660115||Sep 14, 2012||Feb 25, 2014||At&T Intellectual Property Ii, L.P.||Method for content-aware redirection and content renaming|
|US8676530 *||Jan 23, 2007||Mar 18, 2014||Oracle International Corporation||System and method for variation testing for performance test|
|US8799722||Nov 8, 2012||Aug 5, 2014||Metavante Corporation||Business to business network management event detection and response system and method|
|US8838772||Apr 3, 2006||Sep 16, 2014||Ineoquest Technologies, Inc.||System and method for analyzing the performance of multiple transportation streams of streaming media in packet-based networks|
|US9111037||Aug 21, 2013||Aug 18, 2015||Ca, Inc.||Method and apparatus to enable mainframe computer testing for software testing management platform|
|US9124473||Jul 25, 2013||Sep 1, 2015||At&T Intellectual Property I, L.P.||Delivery performance analysis for Internet services|
|US20020052931 *||Oct 10, 2001||May 2, 2002||Christopher Peiffer||HTTP multiplexor/demultiplexor|
|US20020152304 *||Oct 26, 2001||Oct 17, 2002||Metilinx||Aggregate system resource analysis including correlation matrix and metric-based analysis|
|US20020156932 *||Apr 20, 2001||Oct 24, 2002||Marc Schneiderman||Method and apparatus for providing parallel execution of computing tasks in heterogeneous computing environments using autonomous mobile agents|
|US20040064531 *||Oct 1, 2002||Apr 1, 2004||Wisner Steven P.||System and process for projecting hardware requirements for a web site|
|US20040093180 *||Nov 7, 2002||May 13, 2004||Grey James A.||Auto-scheduling of tests|
|US20040111509 *||Dec 10, 2002||Jun 10, 2004||International Business Machines Corporation||Methods and apparatus for dynamic allocation of servers to a plurality of customers to maximize the revenue of a server farm|
|US20040133651 *||Dec 5, 2003||Jul 8, 2004||Bts Holdings Plc||System and method for acquisition, storage and delivery of communications usage data from communications resources|
|US20050010574 *||Jul 7, 2004||Jan 13, 2005||Vaught Jeffrey A.||System and method for providing service level management|
|US20050015485 *||Jan 15, 2004||Jan 20, 2005||Billy Keefer||System and method for agent-based monitoring of network devices|
|US20050022185 *||Jul 10, 2003||Jan 27, 2005||Romero Francisco J.||Systems and methods for monitoring resource utilization and application performance|
|US20050047333 *||Aug 29, 2003||Mar 3, 2005||Ineoquest Technologies||System and Method for Analyzing the Performance of Multiple Transportation Streams of Streaming Media in Packet-Based Networks|
|US20050050138 *||Sep 3, 2003||Mar 3, 2005||International Business Machines Corporation||Status hub used by autonomic application servers|
|US20050114397 *||Mar 30, 2004||May 26, 2005||Computer Associates Think, Inc.||Method and system for management and configuration of remote agents|
|US20050246153 *||Apr 30, 2004||Nov 3, 2005||International Business Machines Corporation||Method and system for recording and replaying service interactions|
|US20050250470 *||May 10, 2004||Nov 10, 2005||Chih-Po Wen||Method and apparatus for managing business cell phone usage|
|US20050262104 *||Jul 21, 2005||Nov 24, 2005||Savvis Communications Corporation||Method and system for internet performance monitoring and analysis|
|US20050289264 *||Jun 8, 2005||Dec 29, 2005||Daniel Illowsky||Device and method for interoperability instruction set|
|US20050289265 *||Jun 8, 2005||Dec 29, 2005||Daniel Illowsky||System method and model for social synchronization interoperability among intermittently connected interoperating devices|
|US20050289266 *||Jun 8, 2005||Dec 29, 2005||Daniel Illowsky||Method and system for interoperable content player device engine|
|US20050289383 *||Jun 8, 2005||Dec 29, 2005||Daniel Illowsky||System and method for interoperability application driven error management and recovery among intermittently coupled interoperable electronic devices|
|US20050289508 *||Jun 8, 2005||Dec 29, 2005||Daniel Illowsky||Method and system for customized programmatic dynamic creation of interoperability content|
|US20050289509 *||Jun 8, 2005||Dec 29, 2005||Daniel Illowsky||Method and system for specifying device interoperability source specifying renditions data and code for interoperable device team|
|US20050289510 *||Jun 8, 2005||Dec 29, 2005||Daniel Illowsky||Method and system for interoperable device enabling hardware abstraction layer modification and engine porting|
|US20050289531 *||Jun 8, 2005||Dec 29, 2005||Daniel Illowsky||Device interoperability tool set and method for processing interoperability application specifications into interoperable application packages|
|US20050289558 *||Jun 8, 2005||Dec 29, 2005||Daniel Illowsky||Device interoperability runtime establishing event serialization and synchronization amongst a plurality of separate processing units and method for coordinating control data and operations|
|US20050289559 *||Jun 8, 2005||Dec 29, 2005||Daniel Illowsky||Method and system for vertical layering between levels in a processing unit facilitating direct event-structures and event-queues level-to-level communication without translation|
|US20060005193 *||Jun 8, 2005||Jan 5, 2006||Daniel Illowsky||Method system and data structure for content renditioning adaptation and interoperability segmentation model|
|US20060005205 *||Jun 8, 2005||Jan 5, 2006||Daniel Illowsky||Device interoperability framework and method for building interoperability applications for interoperable team of devices|
|US20060010453 *||Jun 8, 2005||Jan 12, 2006||Daniel Illowsky||System and method for application driven power management among intermittently coupled interoperable electronic devices|
|US20060014861 *||Jun 9, 2005||Jan 19, 2006||Montana State University||Compositions and methods relating to an adhesive composition|
|US20060015665 *||Jun 8, 2005||Jan 19, 2006||Daniel Illowsky||Method and system for configuring and using virtual pointers to access one or more independent address spaces|
|US20060015936 *||Jun 8, 2005||Jan 19, 2006||Daniel Illowsky||System method and model for social security interoperability among intermittently connected interoperating devices|
|US20060015937 *||Jun 8, 2005||Jan 19, 2006||Daniel Illowsky||System method and model for maintaining device integrity and security among intermittently connected interoperating devices|
|US20060020912 *||Jun 8, 2005||Jan 26, 2006||Daniel Illowsky||Method and system for specifying generating and forming intelligent teams of interoperable devices|
|US20060026305 *||Jun 8, 2005||Feb 2, 2006||Daniel Illowsky||Method and system for device recruitment interoperability and assembling unified interoperating device constellation|
|US20060026588 *||Jun 8, 2005||Feb 2, 2006||Daniel Illowsky||System device and method for configuring and operating interoperable device having player and engine|
|US20060026599 *||Jul 30, 2004||Feb 2, 2006||Herington Daniel E||System and method for operating load balancers for multiple instance applications|
|US20060088030 *||Oct 24, 2005||Apr 27, 2006||Beeson Jesse D||System and method for creating a sequence number field for streaming media in a packet-based networks utilizing internet protocol|
|US20060088035 *||Oct 24, 2005||Apr 27, 2006||Beeson Jesse D||System and method for creating multiple transportation streams of streaming media network test traffic in packet-based networks|
|US20060095914 *||Sep 30, 2005||May 4, 2006||Serguei Mankovski||System and method for job scheduling|
|US20060098586 *||Jul 6, 2005||May 11, 2006||Farrell Craig A||Method and apparatus for application route discovery|
|US20060100892 *||Aug 4, 2005||May 11, 2006||Manohar Ellanti||System and method for neighborhood affinity based online environments|
|US20060116988 *||Apr 21, 2005||Jun 1, 2006||John Toebes||Arrangement for selecting a server to provide distributed services from among multiple servers based on a location of a client device|
|US20060117020 *||Mar 17, 2005||Jun 1, 2006||John Toebes|
|US20060117038 *||May 23, 2005||Jun 1, 2006||John Toebes|
|US20060167891 *||Jan 27, 2005||Jul 27, 2006||Blaisdell Russell C||Method and apparatus for redirecting transactions based on transaction response time policy in a distributed environment|
|US20060168199 *||Jan 27, 2005||Jul 27, 2006||Chagoly Bryan C||Method and apparatus for exposing monitoring violations to the monitored application|
|US20060184670 *||Apr 3, 2006||Aug 17, 2006||Beeson Jesse D|
|US20060206882 *||Jun 8, 2005||Sep 14, 2006||Daniel Illowsky||Method and system for linear tasking among a plurality of processing units|
|US20060259567 *||May 16, 2005||Nov 16, 2006||Jennings Cullen F||Configurable downloading of content pointed to in electronic messages|
|US20070019568 *||Jul 22, 2005||Jan 25, 2007||Sbc Knowledge Ventures, L.P.||Method of monitoring network elements supporting virtual private networks|
|US20080092122 *||Oct 12, 2007||Apr 17, 2008||Infosys Technologies Ltd.||Automated performance monitoring|
|US20120014254 *||Jan 19, 2012||Todd Marc A C||System and method for creating multiple transportation streams of streaming media network test traffic in packet-based networks|
|US20130317781 *||May 25, 2012||Nov 28, 2013||Stefan Fuchs||Dynamic load testing|
|US20140143406 *||Nov 20, 2012||May 22, 2014||Bank Of America Corporation||Dynamically Scalable Real-Time System Monitoring|
|US20140280894 *||Mar 15, 2013||Sep 18, 2014||Patrick Alexander Reynolds||Methods and Computer Program Products for Transaction Relationships Between Application Servers|
|WO2005121959A2 *||Jun 8, 2005||Dec 22, 2005||Dartdevices Corp||Architecture, apparatus and method for device team recruitment and content renditioning for universal device interoperability platform|
|WO2007044150A1 *||Aug 29, 2006||Apr 19, 2007||Microsoft Corp||Improved monitoring of service provider performance|
|WO2011036663A2||Sep 21, 2010||Mar 31, 2011||Correlix Ltd.||Method and system for reconstructing transactions in a communication network|
|WO2014210221A1 *||Jun 25, 2014||Dec 31, 2014||Amazon Technologies, Inc.||Burst mode control|
|U.S. Classification||709/224, 709/223|
|International Classification||G06Q10/06, H04L12/26, H04L12/24|
|Cooperative Classification||H04L43/00, G06Q10/06, H04L43/10, H04L43/0852, H04L12/2602, H04L41/046, H04L43/0817, H04L43/12|
|European Classification||G06Q10/06, H04L43/00, H04L41/04C, H04L12/26M|
|Dec 28, 2000||AS||Assignment|
|Jun 18, 2007||AS||Assignment|
Owner name: MERCURY INTERACTIVE, LLC, DELAWARE
Free format text: CHANGE OF NAME;ASSIGNOR:MERCURY INTERACTIVE CORPORATION;REEL/FRAME:019440/0564
Effective date: 20070116
|Jun 21, 2007||AS||Assignment|
Owner name: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P., TEXAS
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MERCURY INTERACTIVE, LLC;REEL/FRAME:019466/0029
Effective date: 20070604
|Nov 19, 2007||FPAY||Fee payment|
Year of fee payment: 4
|Nov 26, 2007||REMI||Maintenance fee reminder mailed|
|Sep 23, 2011||FPAY||Fee payment|
Year of fee payment: 8